Vulnerabilities > Improper Authentication

DATE CVE VULNERABILITY TITLE RISK
2018-10-10 CVE-2018-16738 Improper Authentication vulnerability in multiple products
tinc 1.0.30 through 1.0.34 has a broken authentication protocol, although there is a partial mitigation.
network
high complexity
tinc-vpn debian starwindsoftware CWE-287
3.7
2018-10-10 CVE-2018-16737 Improper Authentication vulnerability in multiple products
tinc before 1.0.30 has a broken authentication protocol, without even a partial mitigation.
network
low complexity
tinc-vpn starwindsoftware CWE-287
5.3
2018-10-10 CVE-2018-12455 Improper Authentication vulnerability in Intelbras Nplug Firmware 1.0.0.14
Intelbras NPLUG 1.0.0.14 wireless repeater devices have a critical vulnerability that allows an attacker to authenticate in the web interface just by using "admin:" as the name of a cookie.
network
high complexity
intelbras CWE-287
8.1
2018-10-10 CVE-2018-0053 Improper Authentication vulnerability in Juniper Junos 15.1X49
An authentication bypass vulnerability in the initial boot sequence of Juniper Networks Junos OS on vSRX Series may allow an attacker to gain full control of the system without authentication when the system is initially booted up.
low complexity
juniper CWE-287
6.8
2018-10-10 CVE-2018-0052 Improper Authentication vulnerability in Juniper Junos
If RSH service is enabled on Junos OS and if the PAM authentication is disabled, a remote unauthenticated attacker can obtain root access to the device.
network
high complexity
juniper CWE-287
8.1
2018-10-10 CVE-2018-0044 Improper Authentication vulnerability in Juniper Junos 18.1R2
An insecure SSHD configuration in Juniper Device Manager (JDM) and host OS on Juniper NFX Series devices may allow remote unauthenticated access if any of the passwords on the system are empty.
network
high complexity
juniper CWE-287
8.1
2018-10-09 CVE-2018-15543 Improper Authentication vulnerability in Telegram 4.8.11
An issue was discovered in the org.telegram.messenger application 4.8.11 for Android.
low complexity
telegram CWE-287
6.8
2018-10-09 CVE-2018-15542 Improper Authentication vulnerability in Telegram 4.8.11
An issue was discovered in the org.telegram.messenger application 4.8.11 for Android.
high complexity
telegram CWE-287
6.4
2018-10-09 CVE-2018-14080 Improper Authentication vulnerability in D-Link products
An issue was discovered on D-Link DIR-809 A1 through 1.09, A2 through 1.11, and Guest Zone through 1.09 devices.
network
low complexity
d-link CWE-287
7.5
2018-10-07 CVE-2012-6710 Improper Authentication vulnerability in Extplorer
ext_find_user in eXtplorer through 2.1.2 allows remote attackers to bypass authentication via a password[]= (aka an empty array) in an action=login request to index.php.
network
low complexity
extplorer CWE-287
critical
9.8